Required Studying Material to become a Azure Security Engineer
Manage Identity and Access (20-25%)
Configure Microsoft Azure Active Directory for workloads
Create App Registration, configure App Registration permission scopes, manage App Registration permission consent
- https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-v1-add-azure-ad-app
- https://docs.microsoft.com/en-us/azure/active-directory/develop/v1-permissions-and-consent
- https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-permissions-and-consent
Configure Multi-Factor Authentication settings
Manage Microsoft Azure AD directory groups
Manage Microsoft Azure AD users
Install and configure Microsoft Azure AD Connect, configure authentication methods
- https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-custom
- https://docs.microsoft.com/en-us/azure/security/azure-ad-choose-authn
Implement Conditional Access policies
Configure Microsoft Azure AD identity protection
Configure Microsoft Azure AD Privileged Identity Management
Monitor privileged access, configure Access Reviews, activate Privileged Identity Management
- https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-getting-started
- https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-deployment-plan
- https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
Configure Microsoft Azure tenant security
Transfer Microsoft Azure subscriptions between Microsoft Azure AD tenants, manage API access to Microsoft Azure subscriptions and resources
- https://docs.microsoft.com/en-us/azure/billing/billing-subscription-transfer
- https://docs.microsoft.com/en-us/azure/api-management/api-management-howto-aad
- https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-manager-api-authentication
- https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-graph-api
Implement Platform Protection (35-40%)
Implement network security
Configure virtual network connectivity
Configure Network Security Groups (NSGs)
Create and configure Microsoft Azure Firewall
Create and configure application security groups
Configure remote access management
Configure baseline
Configure resource firewall
- https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security
- https://docs.microsoft.com/en-us/azure/sql-database/sql-database-firewall-configure
Implement host security
Configure endpoint security within the VM
Configure VM security
https://docs.microsoft.com/en-us/azure/security/azure-security-iaas
Harden VMs in Microsoft Azure
Configure system updates for VMs in Microsoft Azure
Configure Baseline
Configure container security
Configure network
Configure authentication
Configure container isolation
Configure AKS security
Configure container registry
Configure container instance security
https://docs.microsoft.com/en-us/azure/container-instances/
Implement vulnerability management
Implement Microsoft Azure Resource management security
Create Microsoft Azure resource locks
Manage resource group security
Configure Microsoft Azure policies
https://docs.microsoft.com/en-us/azure/governance/policy/tutorials/create-and-manage
Configure custom RBAC roles
Configure subscription and resource permissions
Manage Security Operations (15-20%)
Configure security services
Configure Microsoft Azure Monitor
Configure Microsoft Azure Log Analytics
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/manage-access
Configure diagnostic logging and log retention
Configure vulnerability scanning
Configure security policies
Configure centralized policy management by using Microsoft Azure Security Center
Configure Just in Time VM access by using Microsoft Azure Security Center
Manage security alerts
Create and customize alerts
Review and respond to alerts and recommendations
- https://docs.microsoft.com/en-us/azure/security-center/security-center-managing-and-responding-alerts
- https://docs.microsoft.com/en-us/azure/security-center/security-center-recommendations
Configure a playbook for a security event by using Microsoft Azure Security Center
https://docs.microsoft.com/en-us/azure/security-center/security-center-playbooks
Investigate escalated security incidents
Secure Data and Applications (30-35%)
Configure security policies to manage data
Configure data classification
Configure data retention
- https://docs.microsoft.com/en-us/rest/api/storageservices/setting-a-storage-analytics-data-retention-policy
- https://docs.microsoft.com/en-us/azure/kusto/management/retention-policy
Configure data sovereignty
Configure security for data infrastructure
Enable database authentication
Enable database auditing
https://docs.microsoft.com/en-us/azure/sql-database/sql-database-auditing
Configure Microsoft Azure SQL Database threat detection
Configure access control for storage accounts
https://docs.microsoft.com/en-us/azure/storage/common/storage-security-guide
Configure key management for storage accounts
Create and manage Shared Access Signatures (SAS)
Configure security for HDInsights
Configure security for Cosmos DB
Configure security for Microsoft Azure Data Lake
- https://docs.microsoft.com/en-us/azure/data-lake-store/data-lake-store-network-security
- https://docs.microsoft.com/en-us/azure/storage/common/storage-data-lake-storage-security-guide